Identity Management components are integral to the correct functioning of an enterprise. Inappropriate modifications can render essential services inaccessible and might violate company protocol. For this reason, we recommend that you do not actually perform these exercises unless you have an isolated test system.